. (a) Draw the basic setup for quantum key distribution.
(b) Explain the “intercept-resend†attack that Eve can attempt(draw a simple figure).
(c) Explain how this attack is thwarted by the quantum keydistribution protocol. How can Eve’s attack be detected?
(d) What does the security of quantum key distribution rely onfundamentally?